3May/100
Unix-like Tips and Tricks: BASH Redirection
Bash is a POSIX shell with a number of extensions. It is the shell for the GNU operating system from the GNU Project. It can be run on most Unix-like operating systems.
In this article I'll talk about bash redirections.
Print This PostSubscribe
Calendar
Polls
Loading ...
Quote of the day
Each generation wants new symbols, new people, new names. They want to divorce themselves from their predecessors.
- Jim Morisson -
- Jim Morisson -
Recent Posts
- Ubuntu: How to install the Classic Desktop in Ubuntu 11.10 (Oneiric Ocelot)
- FreeBSD: How to set up an UPnP Internet Gateway Device (IGD) with MiniUPnP and FreeBSD 9.0
- Ubuntu: How to build and install Linksys AE1000 Wireless-N linux driver on Ubuntu 11.10
- FreeBSD: How to Install and Configure a PPTP VPN server with mpd5 on FreeBSD 8.2
- UNIX Tips: How to find broken symbolic links
Recent Comments
- Alisa M. on FreeBSD: How To Upgrade FreeBSD 7 to 8 Stable Release
- Tiffany P on FreeBSD: How to Install Adobe Flash in FreeBSD 8
- angrypotato1 on How To Reset Keyring Password in Ubuntu
- Nick on Ubuntu: How to build and install Linksys AE1000 Wireless-N linux driver on Ubuntu 11.10
- Martin on FreeBSD: How to set up an UPnP Internet Gateway Device (IGD) with MiniUPnP and FreeBSD 9.0
Blogs
Links
Archives
- March 2012 (1)
- February 2012 (1)
- January 2012 (1)
- December 2011 (1)
- November 2011 (4)
- October 2011 (1)
- September 2011 (1)
- August 2011 (1)
- July 2011 (3)
- June 2011 (1)
- May 2011 (1)
- December 2010 (1)
- November 2010 (1)
- October 2010 (4)
- September 2010 (4)
- August 2010 (5)
- July 2010 (3)
- June 2010 (9)
- May 2010 (13)
- April 2010 (23)
- March 2010 (18)
- February 2010 (6)
Tags
apache
bash
boot
bridge
bsd
centos
debian
fedora
freebsd
google
howto
ifconfig
install
linux
make
monitoring
mount
mysql
mysql-server
network
openbsd
openssh
password recovery
pf
pf.conf
php.ini
php5
ports
rhel
samba
security
server
ssh
sysadmin
tips
tips & tricks
tools
tutorial
tweaking
ubuntu
unix
update
upgrade
virtualization
vulnerabilities